Nov 6, 2025 · 4 min read · Introduction Hello, I'm Adarsh Shetty, AKA Albatraoz, a Senior Appsec Engineer. By day, I secure applications and infrastructure; in my spare time, I enjoy hunting for security vulnerabilities in bug bounty programs. Over the years, my focus has grav...
Join discussion
Sep 14, 2025 · 3 min read · Introduction Hey everyone! In this blog post, I’ll walk you through a recent security vulnerability I discovered during my bug bounty journey. I found a race condition in the unfollow mechanism of a major social media platform (let’s call it “example...
Join discussion
Sep 14, 2025 · 3 min read · Introduction Hello everyone! Today, I’m sharing a story about a business logic vulnerability I found in the checkout flow of a major professional networking platform (let’s call it “example.com” to comply with disclosure rules). This bug allowed me t...
Join discussion
Jul 14, 2025 · 3 min read · As a teenager in Nepal, I’ve been fascinated by how computers and the internet work. I remember breaking my own computer a few times—and fixing it, sometimes with help from YouTube! That early curiosity slowly turned into a deeper interest in underst...
Join discussionJun 19, 2025 · 5 min read · Hey everyone, and welcome back to The CyberFreshy Files! If you thought the digital landscape was moving fast before, buckle up. In our last post, we explored why understanding the evolving threat landscape is crucial for every digital citizen, not j...
Join discussion
May 10, 2025 · 3 min read · In the modern bug bounty and offensive security landscape, automation is the key to speed, scale, and success. Among the many tools available, Nuclei by ProjectDiscovery has rapidly become one of the most powerful and widely adopted scanners for web ...
Join discussionMay 20, 2024 · 2 min read · Ever heard of Nmap? If you're in cybersecurity, this tool should be in your toolkit!🛠️ 🔍 What is Nmap? Nmap (Network Mapper) is a versatile and powerful open-source tool used for network discovery and security auditing. It's designed to help you ma...
ZZETEO commented
Sep 19, 2023 · 3 min read · The blog focuses on Article 28 of the GDPR, which outlines requirements for data processors in the context of data transfers outside the European Economic Area (EEA) in accordance with the GDPR principles. One of the methods to legitimize such transf...
Join discussion